Configure remote VPN easy on 1800 router

Hello

I want to create an easy remote VPN on my cisco router 1800 at work to be able to access my home network

using Cisco VPN client. Does anyone have the configurations for this?

My router is: 192.168.0.253

My DNS server: 192.168.0.78

My external IP address: x.x.x.250

Appreciated all help

Concerning

Here you go:

http://www.Cisco.com/en/us/Tech/tk583/TK372/technologies_configuration_example09186a00800946b7.shtml

Federico.

Tags: Cisco Security

Similar Questions

  • Easy remote VPN - IPsec Session count

    I have recently updated our ASA5510 head to our datacenter to 8.2.1 to 8.4.5. The ASD has been also improved 6.2.1 to 7.1. (1) 52. Under the old code, a connected remote ASA5505 via remote VPN easy showed 1 IPsec tunnel. However, after the upgrade, it shows 42 sessions. It seems to me that each split tunnel network defined in the easy VPN profile is being counted as a tunnel. Someone has seen this, or is - it possible that I may have something misconfigured now that the code is upgraded? Thank you.

    Dave

    No, IMHO, it's a display error in ASDM for 7.1.

    Return to ASDM 6.4.9 and it should be 1 tunnel.

  • Site2Site and remote VPN

    I have a site2site between PIX506 and 877 router VPN. Site A has PIX506 and Site B router a in 877. I configured site2site VPN and it worked fine. I also configured remote VPN on PIX 506 so that the remote user can access A site. But when I configure remote VPN on PIX506 site2site VPN works and both sides can ping each other. But site B users cannot access any resource network or application of the SiteA while site A can access resources of site B. After removing remote VPN site configuration B can access the resources of the Site I joined the configuration of the two sites. Someone help me please site2site and remote VPN work at the same time.

    Please forgive me for not reading every line.

    an add-on quick about the pix configuration:

    change "isakmp key * address 213.181.169.8 netmask 255.255.255.255" at "isakmp key * address 213.181.169.8 netmask 255.255.255.255 No.-xauth No. config-mode.

  • Tunnel remote VPN Site to Site

    Hello

    I am facing a problem with my remote VPN users, I describe my network here. I have a site to another tunnel for my USA, tht IP 169.X.X.X. office client, we are able to connect this tunnel. now I configured remote vpn for users of my home, my office inside the IP is 192.168.2.X and once I connect to home, in the office through vpn cisco client, then, my ip is 192.168.3.X I put the IP in ASA pool, now 192.168.3.X and 192.168.2.X communicates correctly , but I need to access my Tunnel IP 169.1.X.X also from 192.168.3.X (Home).

    203.92.X.X is my static public Ip address that is allowed in the client side for the tunnel.

    If something confussing please let me know.

    Thank you

    Nitin

    Nitin,

    It is not possible to have a NATing on 192.168.3.0/24 to public ip address because it has default route (which you can reach L2L remote host) on the SAA pointing to the external interface. This default route will be redirect/road traffic on the external interface only vpn client so NATing will reach us.

    HTH

    Sangaré

  • Multiple VPN connections using 871 router

    Hello

    I have the cisco router 871 at the site of the retail that connects to the corporate site. I also want to connect a device to the sharing network partner, but it needs to connect to their virtual private network.  Is it possible to configure the 2 VPN connection to 2 different company sites in this scenario?

    Thanks for your help.

    Umesh.

    Hello

    You can configure multiple VPN tunnels on the router (whether on the same interface or different interfaces).

    You can then perform the traffic from a tunnel in another tunnel, if you must do the same.

    Federico.

  • Auth of remote VPN through LDAP allow all users!

    Hello

    I have 5505 firewall and security license. I have configure remote VPN on firewall through CLI with the commands below. Remote VPN works well, but the problem is, it allows all remote VPN users. I need to restrict remote VPN access bit user, I need to configure via CLI, I don't want to go through ASDM, can someone help me with CLI?

    ASDM I can able to perfom below things I'm not able to perform through CLI

    Configuration-> access to the network (Client)-> dynamic access policies

    Through ASDM I'm able to set the VPN users are allow to remote VPN access, how to set up same thing through CLI

    Here's my CLI:

    LDAP attribute-map CISCOMAP

    name of the KFG IETF Radius-class card

    map-value VPN CN = VPN, DC = domain, DC = com noaccess_pri

    map-value VPN CN = VPN, DC = domain, DC = com noaccess_bk

    map-value VPN CN = VPN, DC = domain, DC = com splitgroup_pri

    map-value VPN CN = VPN, DC = domain, DC = com splitgroup_bk

    AAA-server ldapgroup protocol ldap

    ldapgroup AAA-server (inside) host 10.1.10.5

    LDAP-base-dn dc = domain, dc = com

    LDAP-scope subtree

    LDAP-naming-attribute sAMAccountName

    LDAP-login-password Inf0rmati0n1

    LDAP-connection-dn cn = VPN, dc = domain, dc = com

    microsoft server type

    LDAP-attribute-map CISCOMAP

    internal noaccess_pri group policy

    attributes of the strategy of group noaccess_pri

    VPN - concurrent connections 0

    output

    internal noaccess_bk group policy

    attributes of the strategy of group noaccess_bk

    VPN - concurrent connections 0

    output

    internal splitpolicy_pri group policy

    Protocol-tunnel-VPN IPSEC l2tp ipsec

    tunnel-group splitgroup_pri General-attributes

    ldapgroup group-LOCAL authentication server

    internal splitpolicy_bk group policy

    Protocol-tunnel-VPN IPSEC l2tp ipsec

    tunnel-group splitgroup_bk General-attributes

    ldapgroup group-LOCAL authentication server

    Thank you

    Abhishek

    Hello

    You cannot configure the DAP via CLI Protocol because the configuration is saved in a file dap.xml and is stored in flash of the SAA.

    You can configure the DAP protocol using the following link:

    http://www.ciscosystems.com/en/us/products/ps6120/products_white_paper09186a00809fcf38.shtml#T4

    Also note that the link mentions the following:

    Note:

    The dap.xml file that contains the attributes of selection policies DAP, is stored in flash of the SAA. Although you can export the file dap.xml out, the edit box (if you know about the xml syntax), and re - import again, be very careful, because you might ASDM stop treatment of DAP files if you have misconfigured something. There is no CLI to handle this part of the configuration.

    I hope this helps.

    Kind regards

    Anisha

    P.S.: Please mark this message as answered if you feel that your query is resolved. Note the useful messages.

  • The anyconnect vpn easy vpn Remote communication problem

    Hi team,

    I have a problem of communication of the anyconnect vpn easy vpn Remote I´ll explain better below and see the attachment
    topology:

    (1) VPN Tunnel between branch HQ - That´s OK
    (2) VPN Tunnel between Client AnyConnect to HQ - that s OK

    The idea is that the Anyconnect Client is reaching the local Branch Office network, but has not reached.
    Communication is established just when I begin a session (icmp or rdp) branch to the AnyConnect Client,.
    in this way, the communication is OK, but just for a few minutes.

    Could you help me?
    Below the IOS version and configurations

    ASA5505 Version 8.4 (7) 23 (Headquarters)
    ASA5505 Version 7.0000 23 (branch)

    Configuration of the server easy VPN (HQ) *.

    Crypto dynamic-map DYNAMIC - map 5 set transform-set ESP-AES-256-SHA ikev1
    Crypto card outside-link-2_map 1 ipsec-isakmp DYNAMIC-map Dynamics
    Crypto map link-outside-2_map-65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
    Crypto map interface outside-link-2_map outside-link-2

    ACL_EZVPN list standard access allowed 10.0.0.0 255.255.255.0
    ACL_EZVPN list standard access allowed 192.168.1.0 255.255.255.0
    ACL_EZVPN list standard access allowed 192.168.50.0 255.255.255.0
    ACL_EZVPN list standard access allowed 10.10.0.0 255.255.255.0

    internal EZVPN_GP group policy
    EZVPN_GP group policy attributes
    Split-tunnel-policy tunnelspecified
    value of Split-tunnel-network-list ACL_EZVPN
    allow to NEM
    type tunnel-group EZVPN_TG remote access
    attributes global-tunnel-group EZVPN_TG
    Group Policy - by default-EZVPN_GP
    IPSec-attributes tunnel-group EZVPN_TG
    IKEv1 pre-shared-key *.

    object-group network Obj_VPN_anyconnect-local
    object-network 192.168.1.0 255.255.255.0
    object-network 192.168.15.0 255.255.255.0
    object-group network Obj-VPN-anyconnect-remote
    object-network 192.168.50.0 255.255.255.0
    the NAT_EZVPN_Source object-group network
    object-network 192.168.1.0 255.255.255.0
    object-network 10.10.0.0 255.255.255.0
    the NAT_EZVPN_Destination object-group network
    object-network 10.0.0.0 255.255.255.0
     
    destination of Obj_VPN_anyconnect local Obj_VPN_anyconnect-local static NAT (inside, outside-link-2) Obj - VPN static source -.

    Remote AnyConnect VPN - Obj anyconnect-remote non-proxy-arp-search to itinerary
    destination NAT (inside, outside-link-2) static source NAT_EZVPN_Source NAT_EZVPN_Source NAT_EZVPN_Destination static

    NAT_EZVPN_Destination no-proxy-arp-search to itinerary
    NAT (outside-link-2, outside-link-2) static source Obj-VPN-anyconnect-remote Obj-VPN-anyconnect-remote static destination

    NAT_EZVPN_Destination NAT_EZVPN_Destination non-proxy-arp-search route

    Configuration VPN AnyConnect (HQ) *.

    WebVPN
    Select the outside link 2
    by default-idle-timeout 60
    AnyConnect essentials
    AnyConnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1
    AnyConnect profiles Remote_Connection_for_TS_Users disk0: / remote_connection_for_ts_users.xml
    AnyConnect enable
    tunnel-group-list activate

    tunnel of splitting allowed access list standard 192.168.1.0 255.255.255.0
    tunnel of splitting allowed access list standard 192.168.15.0 255.255.255.0
    tunnel of splitting allowed access list standard 10.0.0.0 255.255.255.0

    internal clientgroup group policy
    attributes of the strategy of group clientgroup
    WINS server no
    value of server DNS 192.168.1.41
    client ssl-VPN-tunnel-Protocol
    Split-tunnel-policy tunnelspecified
    Split-tunnel-network-list value split tunnel
    ipconnection.com.br value by default-field
    WebVPN
    AnyConnect Dungeon-Installer installed
    time to generate a new key 30 AnyConnect ssl
    AnyConnect ssl generate a new method ssl key
    AnyConnect value Remote_Connection_for_TS_Users type user profiles
    AnyConnect ask flawless anyconnect

    type tunnel-group sslgroup remote access
    tunnel-group sslgroup General-attributes
    address vpnpool pool
    authentication-server-group DC03
    Group Policy - by default-clientgroup
    tunnel-group sslgroup webvpn-attributes
    enable IPConnection-vpn-anyconnect group-alias

    object-group network Obj_VPN_anyconnect-local
    object-network 192.168.1.0 255.255.255.0
    object-network 192.168.15.0 255.255.255.0
    object-group network Obj-VPN-anyconnect-remote
    object-network 192.168.50.0 255.255.255.0
    the NAT_EZVPN_Source object-group network
    object-network 192.168.1.0 255.255.255.0
    object-network 10.10.0.0 255.255.255.0
    the NAT_EZVPN_Destination object-group network
    object-network 10.0.0.0 255.255.255.0
     
    destination of Obj_VPN_anyconnect local Obj_VPN_anyconnect-local static NAT (inside, outside-link-2) Obj - VPN static source -.

    Remote AnyConnect VPN - Obj anyconnect-remote non-proxy-arp-search to itinerary
    destination NAT (inside, outside-link-2) static source NAT_EZVPN_Source NAT_EZVPN_Source NAT_EZVPN_Destination static

    NAT_EZVPN_Destination no-proxy-arp-search to itinerary
    NAT (outside-link-2, outside-link-2) static source Obj-VPN-anyconnect-remote Obj-VPN-anyconnect-remote static destination

    NAT_EZVPN_Destination NAT_EZVPN_Destination non-proxy-arp-search route

    Hello

    communication works when you send the traffic of easyvpn derivation because it froms the IPSEC SA to pool local subnet and anyconnect HQ. The SA formed only when the branch initiates the connection as it's dynamic peer connection to HQ ASA.

    When there no SA between branch and HQ for this traffic, HQ ASA has no idea on where to send the anyconnect to network traffic.

    I hope this explains the cause.

    Kind regards

    Averroès.

  • Help with 1921 SRI Easy VPN remote w / Easy VPN Site-to-Site access

    I have two 1921 ISR routers configured with easy site to site VPN.  I configured VPN each ISR ACL so that all networks on each site can communicate with the private networks of the other site.   I have a 1921 SRI also configured as an easy VPN server.

    Problem: when a remote user connects to the easy VPN server, the user can only access private networks on the site of the VPN server.  I added the IP network that is used for remote users (i.e. the Easy VPN Server IP pool) to each VPN ACL 1921, but the remote user still cannot access other sites private network via the VPN site to another and vice versa.

    Problem: I also have a problem with the easy VPN server, do not place a static host route in its routing table when he established a remote connection to the remote user and provides the remote user with an IP address of the VPN server's IP pool.  The VPN server does not perform this task the first time the user connects.  If the user disconnects and reconnects the router VPN Server does not have the static host route in its routing table for the new IP address given on the later connection.

    Any help is appreciated.

    THX,

    Greg

    Hello Greg,.

    The ASAs require the "same-security-traffic intra-interface permits" to allow through traffic but routers allow traversed by default (is there no need for equivalent command).

    Therefore, VPN clients can access A LAN but can't access the Remote LAN B on the Site to Site.

    You have added the pool of the VPN client to the ACL for the interesting site to Site traffic.

    You must also add the Remote LAN B to the ACL of tunneling split for VPN clients (assuming you are using split tunneling).

    In other words, the VPN router configuration has for customers VPN should allow remote control B LAN in the traffic that is allowed for the VPN clients.

    You can check the above and do the following test:

    1. try to connect to the remote VPN the B. LAN client

    2. check the "sh cry ips his" for the connection of the VPN client and check if there is a surveillance society being built between the pool and Remote LAN B.

    Federico.

  • QuickVPN - could not do a ping the remote VPN router!

    Hello

    I have a RV042 (VPN router) and I have some problems to run properly using the QuickVPN client.

    Here is the Log of the QuickVPN client.

    2008-10-15 20:14:38 [STATUS] a network interface detected with 192.168.0.104 IP address
    2008-10-15 20:14:38 [STATUS] connection...
    2008-10-15 20:14:38 [STATUS] connection to a remote gateway with IP address: 96.20.174.84
    2008-10-15 20:14:38 [WARNING] server certificate does not exist on your local computer.
    2008-10-15 20:14:44 remote gateway [STATE] has been reached with https...
    2008-10-15 20:14:44 [STATUS] commissioning...
    2008-10-15 20:14:51 [STATUS] Tunnel is connected successfully.
    2008-10-15 20:14:51 [STATUS] verification of network...
    2008-10-15 20:14:55 [WARNING] failed to do a ping the remote VPN router!
    2008-10-15 20:14:58 [WARNING] failed to do a ping the remote VPN router!
    2008-10-15 20:15:01 [WARNING] failed to do a ping the remote VPN router!
    2008-10-15 20:15:05 [WARNING] failed to do a ping the remote VPN router!
    2008-10-15 20:15:08 [WARNING] failed to do a ping the remote VPN router!
    2008-10-15 20:15:11 [WARNING] Ping has been blocked, which can be caused by an unexpected disconnection.
    2008-10-15 20:15:19 [STATUS] disconnection...
    2008-10-15 20:15:25 [STATUS] Tunnel is disconnected successfully.

    I don't know how it is implemented, but if WuickVPN wait a form ping my router, it will not happen. I was never able to ping my router ouside of my ISP network.

    There is a way to disable the Ping process and continue with the VPN connection?

    QuickVPN try ping on the router via the VPN tunnel to check the connection. It should work without worrying about whether your ISP filters ICMP messages or not. The tunnel is encrypted your ISP won't know what you're doing.

    Please post the corresponding on the RV042 VPN log. That is expected to see how far you get.

    You have a firewall running on the computer? I think that some firewalls have difficulty with the traffic of ESP.

    What is the router that is connected to the computer? How is it that is configured?

  • Cisco IOS - access remote VPN - route unwanted problem

    Hello

    I recently ran into a problematic scenario: I am trying to connect to a remote LAN (using a Cisco VPN client on my windows xp machine) my office LAN and access a server there. The problem is that I need a remote local network access at the same time.

    Remote LAN: 172.16.0.0/16

    LAN office: 172.16.45.0/24

    Topology:

    (ME: 172.16.10.138/25) - (several subnets form 172.16.0.0/16) - (Internet cloud) - (VPN-Gateway) - (172.16.45.0/24) - (TARGET: 172.16.45.100)

    To provide access, I configured a VPN to access simple distance on a 1700 series router. It's the relevant part:

    (...)

    crypto ISAKMP client config group group-remote access

    my-key group

    VPN-address-pool

    ACL 100

    IP local pool pool of addresses-vpn - 172.16.55.1 172.16.55.30

    access-list 100 permit ip 172.16.45.100 host 172.16.55.0 0.0.0.31

    (...)

    The configuration works fine, I can access the 172.16.45.100 server every time I need to. However, the problem is that when the VPN connection is connected, Windows wants to somehow rout the packets intended for 172.16.0.0/16 through the VPN tunnel. This is apparently due to a static route that added by the Cisco VPN Client and all other specific VPN routes.

    I suspect that the culprit is the IP LOCAL POOL, since when the VPN is connected, debugging of Client VPN log shows something like "adapter connected, address 172.16.55.1/16. Focus on the part "/ 16". I checked the VPN status page and the only road indicated there was "172.16.45.100 255.255.255.255" under remote routes. Local routes was empty.

    Is this a known problem I missed the obvious solution for? Is there no workaround apart from the pool local vpn penetrating high-end 10.x.x.x or 192.168.x.x? Thank you in advance for advice or tips!

    Hello

    The best way is to avoid any overlap between the local network and VPN pool.

    Try 172.17.0.0/16, is also private IP address space:

    http://en.Wikipedia.org/wiki/Private_network

    Please rate if this helped.

    Kind regards

    Daniel

  • Impossible to establish a VPN connection with a router configured as a Cisco server using client VPN 5.0.00.0340

    Hei guys,.

    Please help me on this one because I'm stuck enough on her...

    I am trying to connect to a Cisco 3700 router configured as a VPN server by using a VPN client and the VPN connection does not settle.

    This is an extract from the log:

    130 12:48:30.585 07/01/11 Sev = Info/5 IKE / 0 x 63000001
    Peer supports XAUTH
    131 12:48:30.585 07/01/11 Sev = WARNING/3 IKE/0xE3000057
    The HASH payload received cannot be verified
    132 12:48:30.600 07/01/11 Sev = WARNING/2 IKE/0xE300007E
    Failed the hash check... may be configured with password invalid group.
    133 12:48:30.600 07/01/11 Sev = WARNING/2 IKE/0xE300009B
    Impossible to authenticate peers (Navigator: 904)
    134 12:48:30.600 07/01/11 Sev = Info/4 IKE / 0 x 63000013
    SEND to > ISAKMP OAK INFO (NOTIFY: INVALID_HASH_INFO) for 200.100.50.173

    I enclose the whole journal extract... The message "BOLD" is quite obvious, you mean, but I'm 100% sure, in the login entry, I typed correctly the group password: pass

    My topology is very basic, as I am setting this up only to get a clue of the operation of the Cisco VPN. It is built in GNS3:
    -2 3700 routers: one of them holds the configuration of the VPN server and the other would be the ISP through which the remote worker would try to establish a VPN connection. I am also attaching the configuration file for the router configured as a VPN router.

    Behind the second router there is a virtual XP machine on which I have installed VPN client...

    My connection entry in the customer is to have the following parameters:
    Host: 200.100.50.173 , //which is the IP address of the VPNServer
    Authentication-> authentication-> name group: grup1 password: pass / / I'm quite positive that I typed the correct password... even if the log messages are linked to a misidentification.

    I use public addresses only, because I noticed there is a question about behind the NAT VPN connections and is not not very familiar to the NAT.

    Another aspect which can be of any importance is that "allow Tunneling of Transport" in the tab Transport to the input connection is disabled

    and the VPNServer router logs the following error message when you try to establish the connection:

    * 01:08:47.147 Mar 1: % CRYPTO-6-IKMP_NOT_ENCRYPTED: IKE 200.100.50.34 package was not encrypted and it should have been.
    * 01:08:47.151 Mar 1: % CRYPTO-6-IKMP_NOT_ENCRYPTED: IKE 200.100.50.34 package was not encrypted and it should have been.

    You have no idea why I can't connect? Y at - it something wrong with my configuration of VPN server... or with the connection entry in the VPN client?

    Thank you

    Iulia

    Depending on the configuration of the router, the group name is grup1 and the password is baby.

    You also lack the ipsec processing game that you would need to apply to the dynamic map.

    Here is an example configuration for your reference:

    http://www.Cisco.com/en/us/Tech/tk583/TK372/technologies_configuration_example09186a0080235197.shtml

    Hope that helps.

  • How to check if the remote VPN failover is configured

    Hello world

    We have two sites and have both remote access VPN configured.

    IF a VPN site fails users automatically fail over to another site.

    Need to know what that orders can I run on ASA to check if remote VPN failover is there?

    Also what lines by running config shhould I seek?

    Thank you

    Mahesh

    Based on your configuration, it can vary, below link has someVPN failover configurations, you can find a few commands to check redundancy on your network:

    http://www.Cisco.com/en/us/docs/iOS/12_2/12_2y/12_2yx11/feature/guide/ft_vpnha.html#wp1093554

    What you should look at your config running is also based on your configuration, it should be something like: main, standby or emergency.

    HTH

  • Routing of a VPN from Site to site to remote VPN users

    Hello

    We have a site and remote vpn site configured in the same interface in ASA 5520 (software version 8.3). When the remote vpn users try to connect to the computers located at the far end of the site to site VPN, their request has failed. I tried No.-Nat between remote vpn IP private to the private IP address of remote site, also said the same split tunneling. I can't find even the tracert, ping has also expired.

    Is there any solution to make this live thing.

    Shankar.

    There are a few things that need to be added to make it work:

    (1) on the SAA where remote vpn users connect to, you must add "permit same-security-traffic intra-interface"

    (2) you mention that you have added the LAN of remote site-to-site in the list of split tunnel, so that's good.

    (3) on the SAA ending the vpn for remote access, you must also add the following text:

    -Crypto ACL for the site to site VPN must include the following:

    permit ip access list

    (4) on the ASA site to remote site, you must add:

    -Crypto ACL for the site to site VPN must include the following:

    permit ip access list

    -No - Nat: ip access list allow

  • HOWTO configure SSL VPN router Cisco 1941?

    Hello.

    How to configure SSL VPN on a router Cisco 1941? I would like a howto guide that is step by step. I've found myself so far.

    Best regards Tommy Svensson

    Here are a few links that might help:

    http://www.Cisco.com/en/us/products/ps6657/prod_configuration_examples_list.html

    http://security-blog.netcraftsmen.NET/2009/02/Cisco-IOS-SSL-VPN-example.html

  • Urgent issue: remote vpn users cannot reach server dmz

    Hi all

    I have an asa5510 firewall in which remote vpn client users can connect but they cannot ping or access the dmz (192.168.3.5) Server

    They also can't ping the out interface (192.168.2.10), below is the show run, please help.

    SH run

    ASA5510 (config) # sh run
    : Saved
    :
    : Serial number: JMX1243L2BE
    : Material: ASA5510, 256 MB RAM, Pentium 4 Celeron 1599 MHz processor
    :
    ASA 5,0000 Version 55
    !
    Majed hostname
    activate the encrypted password of UFWSxxKWdnx8am8f
    2KFQnbNIdI.2KYOU encrypted passwd
    names of
    DNS-guard
    !
    interface Ethernet0/0
    nameif outside
    security-level 0
    IP 192.168.2.10 255.255.255.0
    !
    interface Ethernet0/1
    nameif inside
    security-level 100
    192.168.1.10 IP address 255.255.255.0
    !
    interface Ethernet0/2
    nameif servers
    security-level 90
    192.168.3.10 IP address 255.255.255.0
    !
    interface Ethernet0/3
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface Management0/0
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    boot system Disk0: / asa825-55 - k8.bin
    passive FTP mode
    permit same-security-traffic inter-interface
    permit same-security-traffic intra-interface
    acl_outside to access extended list ip 192.168.5.0 allow 255.255.255.0 192.168.1.0 255.255.255.0
    acl_outside list extended access allow icmp 192.168.5.0 255.255.255.0 192.168.1.0 255.255.255.0
    acl_outside of access allowed any ip an extended list
    acl_outside list extended access permit icmp any one
    acl_inside list extended access allowed host ip 192.168.1.150 192.168.5.0 255.255.255.0
    acl_inside list extended access allowed host icmp 192.168.1.150 192.168.5.0 255.255.255.0
    acl_inside list extended access allowed host ip 192.168.1.200 192.168.5.0 255.255.255.0
    acl_inside list extended access allowed host icmp 192.168.1.200 192.168.5.0 255.255.255.0
    acl_inside list extended access allowed host ip 192.168.1.13 192.168.5.0 255.255.255.0
    acl_inside list extended access allowed host icmp 192.168.1.13 192.168.5.0 255.255.255.0
    acl_inside to access ip 192.168.1.0 scope list allow 255.255.255.0 host 192.168.3.5
    acl_inside list extended access allow icmp 192.168.1.0 255.255.255.0 host 192.168.3.5
    acl_inside list extended access deny ip 192.168.1.0 255.255.255.0 192.168.5.0 255.255.255.0
    acl_inside list extended access deny icmp 192.168.1.0 255.255.255.0 192.168.5.0 255.255.255.0
    acl_inside of access allowed any ip an extended list
    acl_inside list extended access permit icmp any one
    acl_server of access allowed any ip an extended list
    acl_server list extended access permit icmp any one
    Local_LAN_Access list standard access allowed 10.0.0.0 255.0.0.0
    Local_LAN_Access list standard access allowed 172.16.0.0 255.240.0.0
    Local_LAN_Access list standard access allowed 192.168.0.0 255.255.0.0
    access-list nat0 extended ip 192.168.0.0 allow 255.255.0.0 192.168.0.0 255.255.0.0
    allow acl_servers to access extensive ip list a whole
    acl_servers list extended access allow icmp a whole
    pager lines 24
    Outside 1500 MTU
    Within 1500 MTU
    MTU 1500 servers
    IP local pool 192.168.5.1 - 192.168.5.100 mask 255.255.255.0 vpnpool
    ICMP unreachable rate-limit 1 burst-size 1
    ASDM image disk0: / asdm - 621.bin
    don't allow no asdm history
    ARP timeout 14400
    Global 1 interface (outside)
    interface of global (servers) 1
    NAT (inside) 0 access-list nat0
    NAT (inside) 1 192.168.1.4 255.255.255.255
    NAT (inside) 1 192.168.1.9 255.255.255.255
    NAT (inside) 1 192.168.1.27 255.255.255.255
    NAT (inside) 1 192.168.1.56 255.255.255.255
    NAT (inside) 1 192.168.1.150 255.255.255.255
    NAT (inside) 1 192.168.1.200 255.255.255.255
    NAT (inside) 1 192.168.2.5 255.255.255.255
    NAT (inside) 1 192.168.1.0 255.255.255.0
    NAT (inside) 1 192.168.1.96 192.168.1.96
    NAT (servers) - access list 0 nat0
    NAT (servers) 1 192.168.3.5 255.255.255.255
    static (inside, servers) 192.168.1.0 192.168.1.0 netmask 255.255.255.0
    static (servers, inside) 192.168.3.5 192.168.3.5 netmask 255.255.255.255
    Access-group acl_outside in interface outside
    Access-group acl_servers in the servers of the interface
    Route outside 0.0.0.0 0.0.0.0 192.168.2.15 1
    Timeout xlate 03:00
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    Floating conn timeout 0:00:00
    dynamic-access-policy-registration DfltAccessPolicy
    Enable http server
    http 192.168.1.0 255.255.255.0 inside
    http 192.168.3.5 255.255.255.255 servers
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown cold start
    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
    life crypto ipsec security association seconds 28800
    Crypto ipsec kilobytes of life - safety 4608000 association
    Crypto-map dynamic outside_dyn_map 10 the value transform-set ESP-3DES-SHA
    Crypto-map dynamic outside_dyn_map 10 set security-association life seconds288000
    Crypto-map dynamic outside_dyn_map 10 kilobytes of life together - the association of safety 4608000
    Crypto-map dynamic outside_dyn_map 10 the value reverse-road
    map Outside_map 10-isakmp ipsec crypto dynamic outside_dyn_map
    Outside_map interface card crypto outside
    ISAKMP crypto identity hostname
    crypto ISAKMP allow outside
    crypto ISAKMP policy 10
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    crypto ISAKMP policy 65535
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    No encryption isakmp nat-traversal
    Telnet 192.168.2.0 255.255.255.0 outside
    Telnet 192.168.1.0 255.255.255.0 inside
    Telnet 192.168.3.0 255.255.255.0 servers
    Telnet 192.168.38.0 255.255.255.0 servers
    Telnet timeout 5
    SSH timeout 5
    Console timeout 0
    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    WebVPN
    internal vpn group policy
    attributes of vpn group policy
    Protocol-tunnel-VPN IPSec
    Split-tunnel-policy tunnelspecified
    value of Split-tunnel-network-list Local_LAN_Access
    allow to NEM
    password encrypted qaedah Ipsf4W9G6cGueuSu user name
    password encrypted moneef FLlCyoJakDnWMxSQ user name
    chayma X7ESmrqNBIo5eQO9 username encrypted password
    sanaa2 zHa8FdVVTkIgfomY encrypted password username
    sanaa x5fVXsDxboIhq68A encrypted password username
    sanaa1 x5fVXsDxboIhq68A encrypted password username
    bajel encrypted DygNLmMkXoZQ3.DX privilege 15 password username
    daris BgGTY7d1Rfi8P2zH username encrypted password
    taiz Ip3HNgc.pYhYGaQT username encrypted password
    damt gz1OUfAq9Ro2NJoR encrypted privilege 15 password username
    aden MDmCEhcRe64OxrQv username encrypted password
    username hodaidah encrypted password of IYcjP/rqPitKHgyc
    username yareem encrypted password ctC9wXl2EwdhH2XY
    AMMD ZwYsE3.Hs2/vAChB username encrypted password
    haja Q25wF61GjmyJRkjS username encrypted password
    cisco 3USUcOPFUiMCO4Jk encrypted password username
    ibbmr CNnADp0CvQzcjBY5 username encrypted password
    IBBR oJNIDNCT0fBV3OSi encrypted password username
    ibbr 2Mx3uA4acAbE8UOp encrypted password username
    ibbr1 wiq4lRSHUb3geBaN encrypted password username
    password username: TORBA C0eUqr.qWxsD5WNj encrypted
    username, password shibam xJaTjWRZyXM34ou. encrypted
    ibbreef 2Mx3uA4acAbE8UOp encrypted password username
    username torbah encrypted password r3IGnotSy1cddNer
    thamar 1JatoqUxf3q9ivcu encrypted password username
    dhamar pJdo55.oSunKSvIO encrypted password username
    main jsQQRH/5GU772TkF encrypted password username
    main1 ef7y88xzPo6o9m1E encrypted password username
    password username Moussa encrypted OYXnAYHuV80bB0TH
    majed 7I3uhzgJNvIwi2qS encrypted password username
    lahj qOAZDON5RwD6GbnI encrypted password username
    vpn tunnel-group type remote access
    VPN tunnel-group general attributes
    address vpnpool pool
    Group Policy - by default-vpn
    Tunnel vpn ipsec-attributes group
    pre-shared key *.
    !
    class-map inspection_default
    match default-inspection-traffic
    !

    Hello brother Mohammed.

    "my asa5510 to work easy as Server & client vpn at the same time.?

    Yes, it can work as a client and a server at the same time.

    I have never seen anyone do it but many years of my understanding, I have no reason to think why it may be because the two configurations (client/server) are independent of each other.

    Your ASA function as server uses the "DefaultL2LGroup" or it uses standard group policy and tunnel-group are mapped to the remote clients ASA?

    Thank you

Maybe you are looking for